431 |
Developing a Multi-Objective Decision Model for Maximizing IS Security within an OrganizationMay, Jeffrey Lee 01 January 2008 (has links)
Numerous IS researchers have argued that IS Security can be more effectively managed if the emphasis goes beyond the technical means of protecting information resources. In an effort to adopt a broader perspective that accounts for issues that transcend technical means alone, Dhillon and Torkzadeh (2006) present an array of 9 fundamental and 16 means objectives that are essential for maximizing IS security in an organization. These objectives were derived using a value-focused thinking approach and are organized into a conceptual framework. This conceptual framework provides a rigorous theoretical base for considering IS security in a manner that accounts for both technical and organizational issues; however, no direction is provided for using these objectives so that informed decisions can be made. As a result, the goal of this dissertation is to develop a decision model using Multiple Objective Decision Analysis (MODA) techniques that seek to provide informed alternatives to decision makers who desire to maximize IS security within an organization.
|
432 |
Impact of the Investments in Information and Communication Technologies on Total Factor Productivity in the Context of the Economies in TransitionSamoilenko, Sergey 01 January 2006 (has links)
The goal of this research is to establish a link between investments in information and communication technology (ICT) and economic growth in the context of countries that are currently classified by the international community as transitional economies (TE). More specifically, in this study we focus on the relationship between ICT and one of the determinants of economic growth, total factor productivity (TFP). Neoclassical growth accounting and the theory of complementarity provide the theoretical framework on which we build this research. By combining the data obtained from two sources, the World Bank Database and the IT Yearbook, we were able to construct a 10-year data set for 18 TEs spanning the period from 1993 to 2002.Our inquiry is structured as a seven-step process that utilizes six data analytic methods. The first step in our investigation involves Cluster analysis (CA) with the purpose of determining whether or not the selected set of TEs is homogenous. Use of CA allowed us to identify two distinct groups of TEs in our sample, which suggests the heterogeneity of the sample.In the second part of our inquiry, we employ Decision Tree (DT) analysis with the goal of investigating the differences between the clusters of TEs that were generated by the CA in the previous step. We were able to determine that one of the groups of TEs, the "leaders," appears to be wealthier than the other group, the "majority."In the next step of our investigation, we perform Data Envelopment Analysis (DEA) to determine the efficiency of the TEs in our set. We were able to determine that the "leaders" are more efficient than the "majority" not only in terms of the production of the output, but also in terms of the utilization of the inputs.The fourth part of our investigation takes advantage of the DT analysis with the purpose of obtaining the insights into the nature of the differences between the efficient and inefficient TEs. By incorporating the results of the CA into DT analysis we were able to construct the model that suggests, with the high degree of precision, some of the criteria according to which the efficient TEs differ from the inefficient ones.The fifth stage of our investigation involves the use of the Translog regression model for the purpose of determining whether or not there exists a set of investments that are complementary to the investments in ICT. We have determined that there exists a statistically significant interaction effect between the investments in ICT and other variables, representing state of labor, as well as capital investments.The sixth part of our investigation relies on using Structural Equation Modeling (SEM) implemented with Partial Least Squares(PLS)to test for the presence of the relationship between the investments in ICT and the unexplained part of the macroeconomic growth, TFP. We were able to establish the presence of the relationship between the two constructs of our conceptual model, "ICT Capitalization" and "TFP" for the "leaders" group of our sample. The construct "ICT Capitalization" was represented by the three ratio measures, all of which contain variable "Annual investment in telecom" in the denominator, while the Malmquist Index and its components, TC and EC., represented the construct "TFP." Thus, it allows us to state that we have established the presence of the relationship between the investments in ICT and TFP.The last step of the data analysis involves using Classification DT and Neural Network (NN) analyses with the aim of investigating the reasons why some of the TEs exhibit statistically significant relationship between the investments in ICT and TFP, while other TEs do not. We were able to determine that one of the reasons why the "leaders" exhibit the statistically significant relationship between the investments in ICT and TFP is that they have higher level of inputs and more efficient processes of converting the inputs into the outputs than the "majority."
|
433 |
TOWARDS A REFLECTIVE-AGILE LEARNING MODEL AND METHOD IN THE CASE OF SMALL-SHOP SOFTWARE DEVELOPMENT: EVIDENCE FROM AN ACTION RESEARCH STUDYBabb, Jeffry 13 April 2009 (has links)
The ascension and use of agile and lightweight software development methods have challenged extant software design and development paradigms; this is especially notable in the case of small-team and small-shop software development. In this dissertation, a Reflective-Agile Learning Method and Methodology (RALMM) for small-shop software development, is proposed to enhance communication and learning in the use of agile methods. The purpose of the inquiry in this dissertation pertains to: the nature of the professional practice of small team software development; the implications of the epistemology of Reflective Practice has for the professional practice of small-team software development; and whether the introduction of Reflective Practice to an extant agile methodology improves process, productivity and professional confidence for a small development team. This dissertation uses Dialogical Action Research (Mårtensson and Lee 2004), or Dialogical AR, a qualitative and interpretive research approach, to iteratively develop and refine the Reflective-Agile Learning Model and Method (RALMM). The proposed model and method also considers Hazzan and Tomayko’s (2002, 2004, and 2005) synthesis of Schön’s (1983, 1987) Reflective Practice and Extreme Programming (XP). RALMM is shaped by Argyris and Schön’s theories of practice (1974) and Organizational Learning (1978, 1996) and Schön’s ancillary work on generative metaphor (1979) and frames (Schön et al. 1994). The RALMM artifact was developed in a Dialogical AR Partnership using Lee’s (2007) framework for synthesizing design science and action research. The development and use of RALMM facilitated theorizing on the role of Reflective Practice in the successful use of agile methods. To assist in interpretation and analysis, the data collected during Dialogical AR cycles are analyzed using Strauss and Corbin’s (1998) Grounded Theory as a mode of analysis to guide in the coding and analysis of qualitative evidence from the research. As a result of this research, RALMM improved the practitioners’ processes and productivity. Furthermore, RALMM helped to establish, formalize and reinforce a team learning system for the continued development of the practitioners’ professional repertoire. Additionally, the iterative development of RALMM provides a basis for theorizing on Reflective Practice as an epistemology, paradigm, metaphor and frame of reference for the professional practice of small-shop software development.
|
434 |
Development of a Theoretical Model Based Upon Factors Influencing a Firm's Suitability for Organizational EvolutionSones, Ronald T. 01 January 2001 (has links)
Early motion pictures resembled theatre productions on film. Decades would pass before the techniques of special effects and editing evolved to provide the type of movie often shown today. Similarly, early television looked like a radio show where the audience could observe the speakers. Ford's Model T, a "horse-less" carriage. seemed to be designed for a harness. In these examples, successful companies learned how to harness and exploit the power of new technologies--others companies became victims. Companies of the current economy must recognize they face a similar watershed. According to Tom Stewart, the economy effectively transitioned into the Information Age during 1991. "That year, spending for production technology was $107 billion and information technology spending was $112 billion. Call that year one of the information age. Ever since, companies have spent more money on equipment that gathers, processes, analyzes, and distributes information than on machines that stamp, cut, assemble, lift, and otherwise manipulate the physical world." The burgeoning role of the Internet compounds the formal advent of the Information Age. These phenomena beg a critical, well-reasoned response. Whether beginning a new venture or charting a course for an established entity, executives must plan their path with the knowledge of technology shifi occurring.
|
435 |
The Impact of Relational Model Bases on Organizational Decision Making: Cases in E-Commerce and Ecological EconomicsBaker, Elizabeth White 01 January 2006 (has links)
This dissertation explores reifying the management science concept of organizations as a collection of decisions. Organizational management entails resource allocation activities that can be formulated in terms of elementary relational functions. All elasticity-type formulations, most generic "production" functions, and various projection models that organizations might require (such as sales forecasts) can all be represented by elementary relational functions. Therefore, information systems in organizations can be representative of relationships between decision requirements, as theorized in relational model bases. A relational model-base structure acts as an integrative device by relating an organization's elementary relational functions to each other, with all that is kept for any model being the current values for coefficients and the now prevailing parametric values for the state variables of the model.Anchoring management information systems around relational model bases is particularly appropriate for organizations that have some reliance on real-time management decision making by providing the answer to two requirements for such organizations: one being the requirement for more accurate and current real-time, operational decision making within the organization; the other being the integration of functions for decision-making purposes within an organization. Relational model bases thus enable more dynamic management and become a central information system type for organizations that have dynamic resource allocation requirements that can employ technical tactics around such relational model bases. The relational model base would reflect revealed needs in an organization as opposed to projected needs, easing an organization's reliance on forecasting and moving it toward real-time decision making. The case for the introduction of these information systems is further strengthened by the fact that relational model base-type structures are already operating in production environments within organizations. The methodology used in this dissertation involved modeling organizational decision requirements in particular organizational cases to determine the behavior of relational model bases within those prototypical organizations and the application of relational model bases to real-time decision making. The first organizational scenario is a recursive agribusiness e-commerce case, with the target application being precision agriculture. The second scenario is a non-recursive ecological economics case, with the target application being preservation of biodiversity through land (habitat) protection.
|
436 |
Designing a Comprehensive Framework for e-Government Implementation Success with a Special View of the Case of Saudi ArabiaAlsaigh, Mohammed 20 March 2012 (has links)
As a result of the increasing development in the field of Information Systems (IS) in the last decades, new concepts have appeared to serve specific requirements and needs (Smith 2010; Almarabeh and AbuAli 2010). E-government is one of these concepts, which appeared in 1993 (Silva 2006) to become one of the main tools for governments around the world to enhance the services provided by governments and their agencies (Atallah 2001). Investigating the literature shows that there are common issues in all e-government implementation projects which can be summarized as follows: 1) e-government implementation projects in their nature are vast, and usually their success is critical for the country. 2) As the factors affecting the success of the implementation vary from different perspectives such technical, human, and political perspectives, many overlaps and contradictions may appear while maintaining the success factors (West 2006). 3). Despite this verity in the perspectives, e-government implementation project in general should be treated as one unit, and success factors from all perspectives should be considered together in order to have a successful project (Cater et al. 2004). 4) The size of e-government projects and the complexity resulted from perspectives verity have created the need not only for identifying the success factors related to the process of e-government implementation, but also for creating frameworks for managing the implementation process (Chen et al. 2009). In this research, a holistic framework for e-government implementation that considers the complexity of having several perspectives affecting the implementation process during its stages is proposed. We claim that this would solve the expected conflicts that may appear while considering different success factors from different perspectives, and it is supposed to be in compliance with the environment’s situation. Approaching this problem would be an added value to the literature of e-government implementation and the literature of the IS field in general because the claimed holistic framework for e-government implementation is not addressed as an academic research. Also, targeting this problem is distinguished from the sort of problem that a government agency or its consultants would themselves be working on by being a generic framework that fits all countries’ situations, and by considering all perspectives rather than focusing only on delivering the project requirements. In order to achieve this, three artifacts are proposed in this research using Design Science discipline as guidelines for designing these artifacts which are: 1) designing a model represents the success factors for e-government implementation as extracted from the literature, 2) creating a framework for the success process of e-government implementation, and 3) designing a physical instantiation for part of the project of e-government implementation in Saudi Arabia in order to evaluate the proposed framework. The findings of evaluating the proposed framework show tangible improvements in the implementation progress. Because e-government implementation projects are influenced by their environment, the results of this evaluation can be generalized only to other environments similar to Saudi Arabia, and determining the applicability of the proposed framework to other regions is left to future researches.
|
437 |
Power Relationships in Information Systems Security Policy Formulation and ImplementationLapke, Michael Stephen 01 January 2008 (has links)
This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the continuing concern of ineffective security in organizations, leading to significant monetary losses. IS researchers have contended that ineffective IS Security policy is a precursor to ineffective IS Security (Loch et al. 1992; Whitman et al. 2001; David 2002; Solms and Solms 2004). Beyond this pragmatic aspect, there is a gap in the literature concerning power relationships and IS Security policy. This research intends to bridge the gap. The dissertation is a two phased study whereby the first phase seeks to understand the intricacies of IS Security policy formulation and implementation. In the first phase, a conceptual framework utilizes Katz's (1970) semantic theory. The conceptual framework provides the theoretical foundation for a case study that takes place at an educational institution's Information Technology (IT) Department. In the results, it is confirmed that a disconnect exists between IS Security policy formulation and implementation. Furthermore, a significant emergent finding indicates that power relationships have a direct impact on this observed disconnect. The second phase takes place as an in depth case study at the IT department within a large financial organization. The theoretical foundation for the second phase is based was Clegg's (2002) Circuits of Power. A conceptual framework for this phase utilizes this theory. This framework guides the study of power relationships and how they might affect the formulation and implementation of IS Security policy in this organization. The case study demonstrates that power relationships have a clear impact on the formulation and implementation of IS security policy. Though there is a strong security culture at the organization and a well defined set of processes, an improvement in the process and ensuing security culture is possible by accounting for the effect of power relationships.
|
438 |
Why do people use or not use an information technology: an interpretive investigation on the adoption and use of an electronic medical records systemLong, Li 04 December 2008 (has links)
In the literature of information technology acceptance, much empirical evidence exists that is inconsistent with Technology Acceptance (TA) Models. The purpose of this study is to find out why the extant TA models fail to predict in reality as they purport to in theory. This research argues that the extant literature has not been able to explain how individuals actually form their perceptions about using an information technology. Since past research attempting to do this has been unsuccessful or empirically refuted, this research uses an interpretive case study to investigate the experiences of professionals’ adoption and use of an information technology. In particular, this study focuses on the adoption of an Electronic Medical Records System in a healthcare setting. The results of this interpretive investigation show that the interpretive understanding by the traditional TA models researchers is based on the faulty presumption that the people in the organizations are “monolithic users” or “rational decision makers”. This research provides a new interpretive understanding on the adoption and use of an information technology. The adoption and use of an information technology is an emergent phenomenon resulting from the interaction between the technology and the social actors’ different roles. Based on the interpretive understanding, a new positivist understanding is suggested.
|
439 |
DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVESMishra, Sushma 09 December 2008 (has links)
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three emergent dimensions of information security governance for effective control structure in organizations: resource allocation, user involvement and process integrity. The synthesis of data suggests eight principles of information security governance which guides organizations in achieving a comprehensive security environment. We also present a means-end model of ISG which proposes the interrelationships of the developed objectives. Contributions are noted and future research directions suggested.
|
440 |
An Integrated Knowledge Discovery and Data Mining Process ModelSharma, Sumana 30 September 2008 (has links)
Enterprise decision making is continuously transforming in the wake of ever increasing amounts of data. Organizations are collecting massive amounts of data in their quest for knowledge nuggets in form of novel, interesting, understandable patterns that underlie these data. The search for knowledge is a multi-step process comprising of various phases including development of domain (business) understanding, data understanding, data preparation, modeling, evaluation and ultimately, the deployment of the discovered knowledge. These phases are represented in form of Knowledge Discovery and Data Mining (KDDM) Process Models that are meant to provide explicit support towards execution of the complex and iterative knowledge discovery process. Review of existing KDDM process models reveals that they have certain limitations (fragmented design, only a checklist-type description of tasks, lack of support towards execution of tasks, especially those of the business understanding phase etc) which are likely to affect the efficiency and effectiveness with which KDDM projects are currently carried out. This dissertation addresses the various identified limitations of existing KDDM process models through an improved model (named the Integrated Knowledge Discovery and Data Mining Process Model) which presents an integrated view of the KDDM process and provides explicit support towards execution of each one of the tasks outlined in the model. We also evaluate the effectiveness and efficiency offered by the IKDDM model against CRISP-DM, a leading KDDM process model, in aiding data mining users to execute various tasks of the KDDM process. Results of statistical tests indicate that the IKDDM model outperforms the CRISP model in terms of efficiency and effectiveness; the IKDDM model also outperforms CRISP in terms of quality of the process model itself.
|
Page generated in 0.15 seconds